Will the Internet of Things Save us from Traffic Jams?

1_11_12.jpg

Experts have given the green light to a traffic light revolution – but we’re still some distance from a queuing-free future
Traffic is getting worse. It doesn’t just feel that way, the stats prove it: commuters in 2014 spent an average 66 more hours stuck in traffic than they did in 2013, according to navigation tech firm TomTom. So when Internet of things technology is disrupting every part of our lives, when will traffic lights be rethought and rebuilt?
 
Well, the traffic light revolution is already underway. It is all part of the promise of connected and self-driving cars, which allow data about individual journeys, routes and vehicles to be centrally monitored, controlled and systematized.
Once computers are in full control of our cars, do we even need traffic lights at intersections? That’s the idea behind AIM – autonomous intersection management – at the artificial intelligence laboratory at the University of Texas at Austin. Rather than stop at red lights, self-driving cars would schedule a slot through an intersection in real-time, speeding up or slowing down to ensure they’re in the right place at the right time – and not smashing into another car.
For the idea to work, it would require roads to be mostly full of autonomous cars, says project leader Professor Peter Stone – and then it wouldn’t seem so terrifying.
How much faster will careening through intersections be compared to carefully stopping? The researchers compared AIM to heavy traffic on a major road, saying it would reduce delay by as much as 100 times – though that’s only at intersections, not total driving time.
It not only promises to remove time waiting at lights, but will cut fuel usage and emissions as well. “A lot of emissions and fuel usage are caused by acceleration, and our system will allow the cars to make a much more constant speed,” he says, adding that the savings could be “quite significant”.
But even with a complicated system such as AIM, intersections will still be safer than they are today, Prof Stone says, pointing out that a third of all fatal accidents happen at intersections.
“Intersections are already quite dangerous. When a computer’s doing the driving, even with all the cars going through without stopping, it’s going to be a lot safer than it is today.”
Computers aren’t driving our cars yet and won’t be for some time, but there are some connected car projects that already claim to be easing the flow of traffic.
TomTom collects swaths of traffic data from its satnav devices but also used anonymised data from third party navigation apps, including smartphone maps. “We have agreements with a number of smartphone manufacturers, so they provide us with real time GPS feeds wherever their smartphones are,” says Nick Cohn, senior traffic expert at TomTom.
It also gathers data from telematics units installed in fleet vehicles as well as in-dash systems, giving TomTom a comprehensive overview of traffic flows. The resulting information on near real-time congestion is shared with customers, which includes road authorities and they can use it to plan traffic management as well as consumers.
As cars become more connected – whether it’s through satnav or simply the smartphones in our pockets – better data in means we get better data out on the road.
Though traffic data makes it possible to see the movement of traffic in real time, and traffic lights themselves are operated algorithmically, it is still not possible to engineer a way of turning the lights green as you pull up.
This is already happening in in a limited sense, noted Stevens. “At a local signal level, we can implement priority measures for ambulances, buses, etc - that’s a standard feature in some software and has been for years,” says Stevens. “However, giving priority to one vehicle makes things slightly worse for all others. So, there’s little point in giving one or two connected private passenger vehicles special priority.”
There are reasons to give some cars priority, and that’s being trialed by Newcastle. There, traffic lights are “talking” to motorists, sending messages to a device in car about obstacles or delays ahead, as well as helping them adjust their speeds to hit lights when they’re green.
As with any tech innovation, one of the biggest challenges is security. The best example so far is surely hacked construction signs in the US with attackers warning of zombies ahead, but it’s easy to imagine how taking out traffic networks could shut down a city or otherwise wreak havoc.
The best way to achieve it may not be via smart, reactive traffic lights, but by sending messages to drivers in cars, giving them useful information to react to and nudging them into better routes.
“It’s probably easier to change driver behaviour than it is to change the traffic lights.” Until computers take over driving, at least.
Guardian: http://bit.ly/1aKT7eX

 

« Kaspersky Denies KGB Connections
Hiring A Hacker – So, how much do they charge? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

National Agency for Information & Communication Technologies (ANTIC) - Cameroon

ANTIC is responsible for regulating the activities of electronic security and regulation of the Internet in Cameroon.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Osirium

Osirium

The Osirium PxM Privileged Access Management platform addresses both security and compliance requirements by defining who gets access to what and when.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.